Font Size: a A A

Research And Usage Of Endpoint Admission Defense In Campus Network

Posted on:2007-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y X XinFull Text:PDF
GTID:2178360185990783Subject:Computer technology
Abstract/Summary:PDF Full Text Request
One aspect of network convenienence is information sharing.but it also gives us security threat of information from a variety of ranges. This paper analyzes the source of the internet security threat under the new situation,the cause of threat,the actuality of internet security ,and it introduces the tranditional technologies such as firewall technology ,VPN,IDS,anti-virus software.Because each technology mostly acts on the security safeguard of extranet,resolves the problems of communication between intranet and extranet, and can't audit and manage the communications between intranet and extranet and the running status.The intranet running has a blind area, which is passive defence and no defence on it's own initiative.Currently,the brands of network security defence are more dispersed,and there is no guidance of standardized technical,the customs don't known the network safty very much ,so the quality of products varies.Basing on the problems of traditional technologies,this paper associate with the case(campus network), according to the characteristics of existing resource,this paper analyzes the advantages and characteristics of Endpoint Admission Defense(EAD) technology,and emphasizes the design and practice of EAD case.It takes the safty technology to associate the real case with synthetically research,and analyzes the technical charactistics and effects in actual application, the security defense of EAD in real system,the uniform management of all security products,and so on.At last, the author points out that in order to protect our computer system and network security forcefully, we should strengthen the computer information system security program in making full use of all the technologies and policies talking about in the thesis.
Keywords/Search Tags:Network Security, Intranet, SPN, EAD, Security Design, United Operation
PDF Full Text Request
Related items